Internet of things (IoT) design considerations for developers and manufacturers
Title | Internet of things (IoT) design considerations for developers and manufacturers |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Javed, B., Iqbal, M. W., Abbas, H. |
Conference Name | 2017 IEEE International Conference on Communications Workshops (ICC Workshops) |
Keywords | authentication, Business, computer network security, embedded security, Embedded systems, Information security, Internet of Things, IoT, IoT application, IoT Design, IoT ecosystem, large-scale interconnectivity, Monitoring, Protocols, pubcrawl, recommended design considerations, Resiliency, Scalability, Security Assurance, Security by Default, Sensors, smart devices |
Abstract | IoT (Internet of Things) is a network of interconnected devices, designed to collect and exchange data which can then turn it into information, eventually into wisdom. IoT is a region where digital world converges with physical world. With the evolution of IoT, it is expected to create substantial impact on human lives. IoT ecosystem produces and exchanges sizeable data due to which IoT becomes an attractive target for adversary. The large-scale interconnectivity leads to various potential risk related to information security. Security assurance in IoT ecosystem is one of the major challenges to address. In this context, embedded security becomes a key issue in IoT devices which are constrained in terms of processing, power, memory and bandwidth. The focus of this paper is on the recommended design considerations for constrained IoT devices with the objective to achieve security by default. Considering established set of protocols along with best practices during design and development stage can address majority of security challenges. |
URL | https://ieeexplore.ieee.org/document/7962762 |
DOI | 10.1109/ICCW.2017.7962762 |
Citation Key | javed_internet_2017 |
- large-scale interconnectivity
- smart devices
- sensors
- Security by Default
- Security Assurance
- Scalability
- Resiliency
- recommended design considerations
- pubcrawl
- Protocols
- Monitoring
- authentication
- IoT ecosystem
- IoT Design
- IoT application
- IoT
- Internet of Things
- information security
- embedded systems
- embedded security
- computer network security
- Business